[PDF][PDF] Using decision tree and machine learning to recognize users by their behaviour

A Zamfiroiu, R Boncea - … ON INFORMATICS IN ECONOMY (IE 2017) - researchgate.net
This research proposes a complementary method for authenticating users on mobile
applications. The method uses decision trees to recognize user behaviour based on specific …

Authenticity of System Users via Mouse Handling Method

K Kamble, N Mudegol, P Mundada… - … on Advances in …, 2021 - ieeexplore.ieee.org
The proposed work narrate a behavioural bio-metric approach to confirm authenticated
users dynamically based on their mouse motion. A self–generated mouse data [9] was used …

Application of Machine Learning to User Behavior-Based Authentication in Smartphone and Web

M Jayabalan - Applications of Machine Learning and Deep Learning …, 2022 - igi-global.com
Authentication is the preliminary security mechanism employed in the information system to
identify the legitimacy of the user. With technological advancements, hackers with …

An authentication technique: behavioral data profiling on smart phones

SMZ Mohammed, ARM Shariff, MM Singh - Computational Science and …, 2018 - Springer
Mobile devices have become an indispensable component in modern society. Many of
these devices rely on personal identification numbers (PIN) as a form of user authentication …

Typing Patterns for Authenticating and Identifying Users on Touchscreen Devices using Machine Learning

C Vanimaly - … Workshop on Artificial Intelligence and Image …, 2023 - ieeexplore.ieee.org
Authentication systems typically have their limitations and can be the target of attacks. The
present research studies some of the contributions that the application of machine learning …

[PDF][PDF] Authenticating users based on how they pick up smartphones

K Burda - IIT. SRC 2016: 12th Student Research Conf. in …, 2016 - fiit.stuba.sk
User identification and authentication methods become increasingly reliant on the use of
biometrics–observing the user's physiological or behavioral characteristics–to reduce user …

Behavioral Authentication for Smartphones backed by" Something you Process"

N Imtiaz, A Wahid, SSU Hasan, H Akbar… - … University Journal of …, 2022 - fujeas.fui.edu.pk
Authentication of smartphone devices has been never so important nowadays. Machine
learning techniques are not far behind to touch the new milestones of the latest and ever …

[PDF][PDF] Machine Learning for User-Authentication on Mobile Devices using Typing Patterns

OA Odeniyi - Machine Learning, 2024 - ijais.org
With the rising cases of security issues, it has become a major concern and a matter worthy
of note that having a reliable way of ensuring safe activities online or offline is an essential …

Mobile user signature extraction based on user behavioural pattern (MUSEP)

H Sbeyti, B El Hage, A Fadlallah - International Journal of Pervasive …, 2016 - emerald.com
Purpose The purpose of this paper is to extract the user behaviour and transform it into a
unique signature that can be used as implicit authentication technique. Smart devices are …

Mobile user identification through authentication using keystroke dynamics and accelerometer biometrics

KR Corpus, RJDL Gonzales, AS Morada… - Proceedings of the …, 2016 - dl.acm.org
Biometrics is everything that can be measured in a human being. It has two types;
behavioral and physiological. This paper discusses the use of keystroke dynamics, a form of …